Author of the publication

Hierarchical Visualization of Network Intrusion Detection Data.

, , , and . IEEE Computer Graphics and Applications, 26 (2): 40-47 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Speculating Incident Zone System on Local Area Networks., , and . WTMC@SIGCOMM, page 40-45. ACM, (2018)Unknown Attack Detection by Multistage One-Class SVM Focusing on Communication Interval., , , and . ICONIP (3), volume 8836 of Lecture Notes in Computer Science, page 325-332. Springer, (2014)A Dynamic Navigation System Based on User's Geographical Situation., , and . ER Workshops, volume 1552 of Lecture Notes in Computer Science, page 368-379. Springer, (1998)A Design of a Transparent Backup System Using a Main Memory Database., and . DASFAA, volume 4 of Advanced Database Research and Development Series, page 178-185. World Scientific, (1993)A Quantitative Evaluation of a Wide-Area Distributed System with SDN-FIT., , and . COMPSAC, page 607-612. IEEE, (2020)Buffer Space Management in Intermittently Connected Internet of Things: Sharing or Allocation?, , , , , and . IEEE Internet Things J., 9 (13): 10961-10977 (2022)Web Locality Based Ranking Utilizing Location Names and Link Structure., , , and . WISE Workshops, page 56-63. IEEE Computer Society, (2002)A Robust Feature Normalization Scheme and an Optimized Clustering Method for Anomaly-Based Intrusion Detection System., , , and . DASFAA, volume 4443 of Lecture Notes in Computer Science, page 140-151. Springer, (2007)Estimation of cause of ice jam flooding in sub-arctic regions using PALSAR full polarimetry data., , , , and . IGARSS, page 843-846. IEEE, (2014)An Adaptive Honeypot System to Capture IPv6 Address Scans., , , , and . CyberSecurity, page 165-172. IEEE Computer Society, (2012)